A cyber attack is a malicious attack conducted by cybercriminals against a single or multiple computers, networks, or infrastructure with the intention of disabling/destroying the target computers, stealing/exposing data, gaining unauthorized administrative access, or using the targeted computer as a launch point for other attacks.
Cybercriminals attack through deploying several methods including malware/ransomware/spyware dropping, phishing campaigns, Denial of Service attacks, zero-day exploits, Man-in-the-Middle attacks, Cryptojacking, SQL injection, and DNS tunneling.
Cybercriminals, individuals or teams, have various motives for committing attacks; the most relevant ones include financial gain, theft of intellectual property, making a political statement, gaining fame, and revenge.
There is no doubt about the strength of Apple security features. It seems that it is time to say goodbye to Apple’s controversial feature from its macOS operating system. That means Apple’s applications are not allowed to bypass content filters, VPNs, and third-party firewalls. These applications that contain more than 50 popular apps, besides the…
On the 15th of February, the Joker’s Stash “the biggest vendor of the dark web” stops operating. It means that one of the largest data sellers that is notorious for selling compromised payment card data is going to leave the arena of the dark web. The question is that, will it be a chance to…
The mobile remote access Trojan reached the gates of the Android world. Researchers have warned Android users of the risk of exfiltration of their information, such as photos, locations, contacts, and messages from popular apps such as Facebook, Instagram, WhatsApp, Skype, Telegram, Kik, Line, and Google Messages. This danger is derived from a second threat…
While too many people still don’t know anything about Hardware security keys, such as those from Google and Yubico, Companies are trying to introduce them as the most secure hardware ever. Although these tools are highly resistant to phishing and takeover attacks, the new attacks could let hackers Clone Hardware security keys. An electromagnetic side-channel…
Reverse proxy in computer networks is a type of proxy server, which receives the resources and requests of a client and directs them to one or more servers. The reverse servers perform as the opposite of a forward proxy server, receiving user requests from outside the internal network to smooth the flow of network traffic…
” how to hack Google ?” is probably one of the most interesting questions that any hacker may ask from himself. Hackers have always been on the lookout for ways to hack Google and its tools. Now, it seems that some have managed to find their way. One of the tools that Google uses to…
The term ‘hacking’ and ‘hacker’ first originated in the 1960s at MIT. Nowadays, the word hacker is associated negatively and mostly refers to thieves and cybercriminals. There is no official definition of a hacker, rather a vague idea among the masses. Originally, society viewed hackers as a clever or expert programmer whose sole purpose was…
Popular services, programs, and organizations have always been a target of cyber-attacks to exploit the vulnerabilities in the service, steal users’ information, steal sensitive corporate information, or compromise the infrastructure. We have gathered the major cyber news over the past week in one post. TikTok fails to fulfill Children’s Privacy agreement The popular video-sharing app…
Popular services, programs, and organizations have always been a target of cyber attacks to exploit the vulnerabilities in the service, steal users’ information, steal sensitive corporate information, or compromise the infrastructure. We have gathered the major cyber news over the past week including Cerberus RAT, WordPress plugins vulnerabilities, Cisco Webex phishing emails, Cisco update, and…
Researchers discovered a new phishing campaign targeting Skype users and stealing their passwords. With the COVID-19 pandemic going on, people are now urged to keep their communications via online applications resulting in a surge in popularity of video chatting apps such as Zoom, Skype and Webex. Skype users are being the target of a Skype…